RSS

Compare Point vs Multipoint vs Broadcast

21 Dec

    We have several type of communications to determined the method of connecting the host on network. There are point-to-point, multipoint and broadcast. This topic will be discriminate multipoint and point to point and broadcast

     

    Table comparing:

    Property

    Point to point

    Multipoint

    Broadcast

    Connection

    One to one

    One to multi stations

    One to All stations

    End stations

    One

    More

    More and undefined

    Security

    Yes

    Few

    No

    Spending

    Few

    More

    more

    Point to Point:

    This is used in serial(một vài) communication. These type of communications transmitted solely( only one) the station at the opposite end device. No addresses are necessary. Only device connect to only device.

    So, it’s the infinite security. Because don’t have another devices connecting in the same time, data only come in one device.

    However, it’s very waste money. Simply meaning , we have to spend transmission equipment more than.

     

    Some examples used it:

    • EIA/TIA 232
    • EIA/TIA 449
    • OC3 – OC192

     

    Multipoint

    This is type of connect from one station to several other stations . Datas have been given to other stations that need to send. But don’t have broadcast, just only specific selected stations hear the replicated communication.

    It’s the few security. Because, data have to send to many stations and maybe lost in transmission or stealing.

    Some examples used it:

    • ATM

     

    Broadcast

     

    Both communication and protocol. It will be send data to all stations have to connecting with it. This always using for information need to send to the stations without knowledge about it.

    It doesn’t security. Because, data will dispersal in the network and don’t managed.

    Some examples used it:

     

     

     

    References :

    http://www.inetdaemon.com

written by :hotdream1990

 
Leave a comment

Posted by on December 21, 2010 in Java, Knowledge, Network-Management

 

Tags: , , , , , , , , , ,

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s